|
FNR PEARL Chair
|
Externo |
Passing Juice |
|
University of Luxembourg
|
Externo |
Passing Juice |
|
Interdisciplinary Centre for Security, Reliability and Trust (SnT)
|
Externo |
Passing Juice |
|
OpenSky Network
|
Externo |
Passing Juice |
|
Electrosense
|
Externo |
Passing Juice |
|
Cyber-Defence Campus
|
Externo |
Passing Juice |
|
armasuisse Science and Technology
|
Externo |
Passing Juice |
|
ETH Zürich
|
Externo |
Passing Juice |
|
Princeton University
|
Externo |
Passing Juice |
|
IEEE WONS 2012
|
Externo |
Passing Juice |
|
DFRWS EU 2015
|
Externo |
Passing Juice |
|
ACM CPSS 2015 & 2021
|
Externo |
Passing Juice |
|
DASC 2015
|
Externo |
Passing Juice |
|
Swiss Economic Forum
|
Externo |
Passing Juice |
|
Zurich Information Security and Privacy Center (ZISC)
|
Externo |
Passing Juice |
|
CYD Fellowship
|
Externo |
Passing Juice |
|
Uni.lu
|
Externo |
Passing Juice |
|
Google scholar
|
Externo |
Passing Juice |
|
DBLP
|
Externo |
Passing Juice |
|
ACM
|
Externo |
Passing Juice |
|
SNS project
|
Externo |
Passing Juice |
|
job portal
|
Externo |
Passing Juice |
|
quantum technologies
|
Externo |
Passing Juice |
|
ACM WiSec 2026
|
Externo |
Passing Juice |
|
SpaceSec 2026
|
Externo |
Passing Juice |
|
Paperjam
|
Externo |
Passing Juice |
|
University of Luxembourg
|
Externo |
Passing Juice |
|
Swiss Venture Capital Report 2025
|
Interno |
Passing Juice |
|
DEF CON 32
|
Externo |
Passing Juice |
|
large language models in cybersecurity
|
Externo |
Passing Juice |
|
trends in data protection and encryption technologies
|
Externo |
Passing Juice |
|
CPSS 2021
|
Externo |
Passing Juice |
|
armasuisse
|
Externo |
Passing Juice |
|
NZZ
|
Externo |
Passing Juice |
|
Can't Hide Your Stride: Inferring Car Movement Patterns from Passive TPMS Measurements
|
Interno |
Passing Juice |
|
Lightweight Internet Bandwidth Allocation and Isolation with Fractional Fair Shares
|
Interno |
Passing Juice |
|
Practical Challenges in Executing Shor's Algorithm on Existing Quantum Platforms
|
Interno |
Passing Juice |
|
Understanding Citizen Science: Insights from the 2024/2025 OpenSky Network User Survey
|
Interno |
Passing Juice |
|
Exploring the Role of Artificial Intelligence in Enhancing Security Operations: A Systematic Review
|
Interno |
Passing Juice |
|
SOK: Automating Kernel Vulnerability Discovery and Exploit Generation
|
Interno |
Passing Juice |
|
Universal Spoofing of Real-World Aircraft Multilateration
|
Interno |
Passing Juice |
|
Next Steps in Cyber Blue Team Automation – Leveraging the Power of LLMs
|
Interno |
Passing Juice |
|
Navigating Turbulence: Understanding New GNSS Risks in Conflict Zones
|
Interno |
Passing Juice |
|
OpenSky Report 2025: Improving Crowdsourced Flight Trajectories with ADS-C Data
|
Interno |
Passing Juice |
|
ROBoost: A Study of FPGA Logic-Based Power-Wasting Primitives
|
Interno |
Passing Juice |
|
LeoCommon - A Ground Station Observatory Network for LEO Satellite Research
|
Interno |
Passing Juice |
|
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs
|
Interno |
Passing Juice |
|
Wireless Signal Injection Attacks on VSAT Satellite Modems
|
Interno |
Passing Juice |
|
On a Collision Course: Unveilling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)
|
Interno |
Passing Juice |
|
Record: A Reception-Only Region Determination Attack on LEO Satellite Users
|
Interno |
Passing Juice |
|
HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education
|
Interno |
Passing Juice |
|
VSAsTer:
Uncovering Inherent Security Issues in Current VSAT System Practices
|
Interno |
Passing Juice |
|
On Building Secure Wide Area Networks over Public Internet Service Providers
|
Interno |
Passing Juice |
|
Defeating and Improving Network Flow Classifiers Through Adversarial Machine Learning
|
Interno |
Passing Juice |
|
Automated Identification of Emerging Technologies: Open Data Approach
|
Interno |
Passing Juice |
|
Satellite Cybersecurity Reconnaissance: Strategies and their Real-world Evaluation
|
Interno |
Passing Juice |
|
On the Security of Satellite-Based Air Traffic Control (ADS-C)
|
Interno |
Passing Juice |
|
SkyPos: Real-World Evaluation of Self-Positioning with Aircraft Signals for IoT Devices
|
Interno |
Passing Juice |
|
A First Look at Leveraging the Automatic Dependent Surveillance-Contract Protocol for Open Aviation Research
|
Interno |
Passing Juice |
|
Scaling the Timing-Based Detection of Anomalies in Real-World Aircraft Trajectories
|
Interno |
Passing Juice |
|
Lessons Learned in Transcribing 5000 h of ATC Communications for Robust Automatic Speech Understanding
|
Interno |
Passing Juice |
|
Inter-Domain Path Selection Based on AS-Attested Router Properties
|
Interno |
Passing Juice |
|
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic
|
Interno |
Passing Juice |
|
Modeling 5G Threat Scenarios for Critical Infrastructure Protection
|
Interno |
Passing Juice |
|
From Scattered Sources to Comprehensive Technology Landscape: A Recommendation-based Retrieval Approach
|
Interno |
Passing Juice |
|
In Pursuit of Aviation
Cybersecurity: Experiences and Lessons from a Competitive Approach
|
Interno |
Passing Juice |
|
Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense
|
Interno |
Passing Juice |
|
DFAulted: Analyzing and Exploiting CPU Software Faults Caused by FPGA-Driven Undervolting Attacks
|
Interno |
Passing Juice |
|
A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing
|
Interno |
Passing Juice |
|
OpenSky Report 2022: Evaluating Aviation
Emissions Using Crowdsourced Open Flight Data
|
Interno |
Passing Juice |
|
High Data Throughput Exfiltration through Video Cable Emanations
|
Interno |
Passing Juice |
|
Aggregate-based Congestion Control for Pulse-Wave DDoS Defense
|
Interno |
Passing Juice |
|
An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs
|
Interno |
Passing Juice |
|
Building an Avionics Laboratory for Cybersecurity Testing
|
Interno |
Passing Juice |
|
Improving Aircraft Localization: Experiences and Lessons Learned from an Open Competition
|
Interno |
Passing Juice |
|
Security and Privacy Issues of Satellite Communication in the Aviation Domain
|
Interno |
Passing Juice |
|
On the Security of the FLARM Collision Warning System
|
Interno |
Passing Juice |
|
ditto: WAN Traffic Obfuscation at Line Rate
|
Interno |
Passing Juice |
|
FPGA-to-CPU Undervolting Attacks
|
Interno |
Passing Juice |
|
Understanding Realistic Attacks on Airborne Collision Avoidance Systems
|
Interno |
Passing Juice |
|
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era
|
Interno |
Passing Juice |
|
Cybersecurity Technologies: An Overview of Trends and Activities in Switzerland and Abroad
|
Interno |
Passing Juice |
|
From Scattered Sources to Comprehensive Technology Landscape: A Recommendation-based Retrieval Approach
|
Interno |
Passing Juice |
|
OpenSky Report 2021: Insights on ADS-B Mandate and Fleet Deployment in Times of Crisis
|
Interno |
Passing Juice |
|
Studying Neutrality in Cyber-Space: A Comparative Geographical Analysis of Honeypot Responses
|
Interno |
Passing Juice |
|
5G System Security Analysis
|
Interno |
Passing Juice |
|
You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications
|
Interno |
Passing Juice |
|
Orbit-based Authentication Using TDOA Signatures in Satellite Networks
|
Interno |
Passing Juice |
|
Towards an AI-powered Player in Cyber Defense Exercises
|
Interno |
Passing Juice |
|
In the Same Boat: On Small Satellites, Big Rockets, and Cyber-Trust
|
Interno |
Passing Juice |
|
Classi-Fly: Inferring Aircraft Categories from Open Data
|
Interno |
Passing Juice |
|
On Jamming Attacks in Crowdsourced Air Traffic Surveillance
|
Interno |
Passing Juice |
|
Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective
|
Interno |
Passing Juice |
|
Crowdsourced Air Traffic Data from the OpenSky Network 2019–20
|
Interno |
Passing Juice |
|
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit
|
Interno |
Passing Juice |
|
LocaRDS: A Localization Reference Data Set
|
Interno |
Passing Juice |
|
Understanding Realistic Attacks on Airborne Collision Avoidance Systems
|
Interno |
Passing Juice |
|
OpenSky Report 2020: Analysing In-flight Emergencies using Big Data
|
Interno |
Passing Juice |
|
Contact Tracing: An Overview of Technologies and Cyber Risks
|
Interno |
Passing Juice |
|
SkySense: Terrestrial and Aerial Spectrum Use Analysed Using Lightweight Sensing Technology with Weather Balloons
|
Interno |
Passing Juice |
|
A Tale of Sea and Sky: On the Security of Maritime VSAT Communications
|
Interno |
Passing Juice |
|
Electrosense+:
Crowdsourcing Radio Spectrum Decoding using IoT Receivers
|
Interno |
Passing Juice |
|
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband
|
Interno |
Passing Juice |
|
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems
|
Interno |
Passing Juice |
|
Securing the Air-Ground Link in Aviation
|
Externo |
Passing Juice |
|
Crowdsourced Wireless Spectrum Anomaly Detection
|
Interno |
Passing Juice |
|
(Self) Driving Under the Influence: Adversarial Network Inputs Matter
|
Interno |
Passing Juice |
|
Higher than a Kite: ADS-B Communication
Analysis Using a High-Altitude Balloon
|
Interno |
Passing Juice |
|
Jamming/Garbling Assessment and Possible Mitigations in the OpenSky Network
|
Interno |
Passing Juice |
|
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics
|
Interno |
Passing Juice |
|
Event Detection on Microposts: a Comparison of Four Approaches
|
Interno |
Passing Juice |
|
Secure Location Verification: Why you Want your Verifiers to be Mobile?
|
Interno |
Passing Juice |
|
OpenSky Report 2019: Analysing TCAS in the Real World using Big Data
|
Interno |
Passing Juice |
|
On the Applicability of Satellite-based Air Traffic Control Communication for Security
|
Interno |
Passing Juice |
|
Classi-Fly: Inferring Aircraft Categories from Open Data
|
Interno |
Passing Juice |
|
Safety vs. Security: Attacking Avionic Systems with Humans in the Loop
|
Interno |
Passing Juice |
|
Digital Radio Signal Cancellation Attacks - An Experimental Evaluation
|
Interno |
Passing Juice |
|
Secrets in the Sky: On Privacy and Infrastructure Security in DVB-S Satellite Broadband
|
Interno |
Passing Juice |
|
BlackWidow: Monitoring the Dark Web for Cyber Security Information
|
Interno |
Passing Juice |
|
Machine Learning based Detection of C&C Channels by the Example of the Locked Shields Cyber Defense Exercise
|
Interno |
Passing Juice |
|
Detection of Malicious Remote Shell Sessions
|
Interno |
Passing Juice |
|
Design and Evaluation of a Low-Cost Passive Radar Receiver Based on IoT Hardware
|
Interno |
Passing Juice |
|
Collaborative Wideband Signal Decoding using Non-coherent Receivers
|
Interno |
Passing Juice |
|
SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features
|
Interno |
Passing Juice |
|
Deep Learning Models for Wireless Signal Classification with Distributed Low-Cost Spectrum Sensors
|
Interno |
Passing Juice |
|
OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data
|
Interno |
Passing Juice |
|
Surveying Aviation Professionals on the Security of the Air Traffic Control System
|
Interno |
Passing Juice |
|
NetHide: Secure and Practical Network Topology Obfuscation
|
Interno |
Passing Juice |
|
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
|
Interno |
Passing Juice |
|
Interference Supression in Bandwidth Hopping Spread Spectrum Communications
|
Interno |
Passing Juice |
|
FeedRank: A Tamper-resistant Method for the Ranking of Cyber Threat Intelligence Feeds
|
Interno |
Passing Juice |
|
Screen Watermarking for Data Theft Investigation and Attribution
|
Interno |
Passing Juice |
|
Utilizing Air Traffic Communications for OSINT on State and Government Aircraft
|
Interno |
Passing Juice |
|
Fusing Flight Data with Social Media Data
|
Interno |
Passing Juice |
|
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
|
Interno |
Passing Juice |
|
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts
|
Interno |
Passing Juice |
|
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication
|
Interno |
Passing Juice |
|
Nanosecond-precision Time-of-Arrival Estimation for Aircraft Signals with low-cost SDR Receivers
|
Interno |
Passing Juice |
|
Data Fusion for Hybrid and Autonomous Time-of-Flight Positioning
|
Interno |
Passing Juice |
|
Monitoring Meteorological Parameters With Crowdsourced Air Traffic Control Data
|
Interno |
Passing Juice |
|
A k-NN-based Localization Approach for Crowdsourced Air Traffic Communication Networks
|
Interno |
Passing Juice |
|
Electrosense: Open and Big Spectrum Data
|
Interno |
Passing Juice |
|
LTESS-track: A Precise and Fast Frequency Offset Estimation for Low-cost SDR Platforms
|
Interno |
Passing Juice |
|
Quantifying Web Adblocker Privacy
|
Interno |
Passing Juice |
|
Measuring Spectrum Similarity in Distributed Radio Monitoring Systems
|
Interno |
Passing Juice |
|
OpenSky Report 2017: Mode S and ADS-B Usage of Military and State Aircraft
|
Interno |
Passing Juice |
|
Filtering Noisy 802.11 Time-of-Flight Ranging Measurements from Commoditized WiFi Radios
|
Interno |
Passing Juice |
|
Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors
|
Interno |
Passing Juice |
|
Unsupervised Detection of APT C&C Channels using Web Request Graphs
|
Interno |
Passing Juice |
|
Crowdsourcing Security for Wireless Air Traffic Communications
|
Interno |
Passing Juice |
|
ArmaTweet: Detecting Events by Semantic Tweet Analysis
|
Interno |
Passing Juice |
|
Crowdsourcing Spectrum Data Decoding
|
Interno |
Passing Juice |
|
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
|
Interno |
Passing Juice |
|
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
|
Interno |
Passing Juice |
|
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System
|
Interno |
Passing Juice |
|
Electrosense: Crowdsourcing Spectrum Monitoring
|
Interno |
Passing Juice |
|
On Perception and Reality in Wireless Air Traffic Communications Security
|
Interno |
Passing Juice |
|
A Localization Approach for Crowdsourced Air Traffic Communication Networks
|
Interno |
Passing Juice |
|
Quantifying Web Adblocker Privacy
|
Interno |
Passing Juice |
|
Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
|
Interno |
Passing Juice |
|
OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS-B Usage
|
Interno |
Passing Juice |
|
Quantifying Location Privacy Leakage from Transaction Prices
|
Interno |
Passing Juice |
|
Secure Motion Verification
using the Doppler Effect
|
Interno |
Passing Juice |
|
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
|
Interno |
Passing Juice |
|
Assessing the Impact of Aviation Security on Cyber Power
|
Interno |
Passing Juice |
|
Evaluation of Self-Positioning Algorithms for Time-of-Flight based Localization
|
Interno |
Passing Juice |
|
On the Security and Privacy of ACARS
|
Interno |
Passing Juice |
|
On Perception and Reality in Wireless Air Traffic Communications Security
|
Interno |
Passing Juice |
|
Jamming Mitigation by Randomized Bandwidth Hopping
|
Interno |
Passing Juice |
|
Deep Inspection of the Noise in WiFi Time-of-Flight
Echo Techniques
|
Interno |
Passing Juice |
|
OpenSky: A Swiss Army Knife for Air Traffic Security Research
|
Interno |
Passing Juice |
|
Towards Understanding Upstream Web Traffic
|
Interno |
Passing Juice |
|
Can Content-based DLP Solutions Prevent Data Leakage in Web Traffic?
|
Interno |
Passing Juice |
|
Intrusion Detection for Airborne Communication using PHY-Layer Information
|
Interno |
Passing Juice |
|
An Automated Approach for Complementing
Ad Blockers Blacklists
|
Interno |
Passing Juice |
|
Security By Mobility in Location and Track Verification
|
Interno |
Passing Juice |
|
Secure Track Verification
|
Interno |
Passing Juice |
|
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
|
Interno |
Passing Juice |
|
Lightweight Location Verification in Air Traffic Surveillance Networks
|
Interno |
Passing Juice |
|
A Realistic Evaluation and Comparison of Indoor Location
Technologies: Experiences and Lessons Learned
|
Interno |
Passing Juice |
|
A Software-defined Sensor Architecture for Large-scale Wideband Spectrum Monitoring
|
Interno |
Passing Juice |
|
Gaining an Edge in Cyberspace with Advanced
Situational Awareness
|
Interno |
Passing Juice |
|
Hviz: HTTP(S) Traffic Aggregation and Vizualization for Network Forensics
|
Interno |
Passing Juice |
|
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
|
Interno |
Passing Juice |
|
Filtering Noisy 802.11 Time-of-Flight Ranging Measurements
|
Interno |
Passing Juice |
|
Towards Classifying Third-Party Web Services at Scale
|
Interno |
Passing Juice |
|
On the Reception of Concurrent Transmissions in Wireless Sensor Networks
|
Interno |
Passing Juice |
|
Quantifying Web-Search Privacy
|
Interno |
Passing Juice |
|
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
|
Interno |
Passing Juice |
|
Secure Path Verification using Mobility-Differentiated ToA
|
Interno |
Passing Juice |
|
Advanced
Situational Awareness for Active Cyber Defense
|
Interno |
Passing Juice |
|
Realities and Challenges of NextGen Air Traffic Management: The Case of ADS-B
|
Interno |
Passing Juice |
|
Practical Limits of WiFi Time-of-Flight Echo Techniques
|
Interno |
Passing Juice |
|
Bringing Up OpenSky: A Large-scale ADS-B Sensor Network for Research
|
Interno |
Passing Juice |
|
Detection of Reactive Jamming in DSSS-based Wireless Communications
|
Interno |
Passing Juice |
|
Semantic Fusion of Live Web Content: System Design and Implementation Experiences
|
Interno |
Passing Juice |
|
Experimental Analysis of Attacks on Next Generation Air Traffic Communication
|
Interno |
Passing Juice |
|
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
|
Interno |
Passing Juice |
|
Long-term Preservation of Data Leakage Evidence in Web Traffic
|
Interno |
Passing Juice |
|
Detection of Reactive Jamming in DSSS-based Wireless Networks
|
Interno |
Passing Juice |
|
Blitz: Wireless Link Quality Estimation in the Dark
|
Interno |
Passing Juice |
|
AFR: Automatic Multi-Stage Forensic Data Retrieval
|
Interno |
Passing Juice |
|
Exploring the Physical-layer Identification of GSM Devices
|
Interno |
Passing Juice |
|
Fast and Accurate Packet Delivery Estimation based on DSSS Chip Error
Measurements
|
Interno |
Passing Juice |
|
Practical Message Manipulation Attacks
in IEEE 802.15.4 Wireless Networks
|
Interno |
Passing Juice |
|
Obfuscating IEEE 802.15.4 Communication Using Secret Spreading Codes
|
Interno |
Passing Juice |
|
Holmes: A Data Theft Forensic Framework
|
Interno |
Passing Juice |
|
WiFire: A Firewall for Wireless Networks
|
Interno |
Passing Juice |
|
RFReact - A Real-time Capable and Channel-aware Jamming Platform
|
Interno |
Passing Juice |
|
Reactive Jamming in Wireless Networks: How Realistic is the Threat?
|
Interno |
Passing Juice |
|
Performance of Opportunistic Content Distribution under Different Levels of Cooperation
|
Interno |
Passing Juice |
|
Repeatable and Realistic Experimentation in Mobile Wireless Networks
|
Interno |
Passing Juice |
|
An Empirical Analysis of the Impact of Mobility on Link Failures in an 802.11 Ad Hoc Network
|
Interno |
Passing Juice |
|
Density-based Anycast: A Robust Routing Strategy for Wireless Ad Hoc Networks
|
Interno |
Passing Juice |
|
Narrowcasting: an Empirical Performance Evaluation Study
|
Interno |
Passing Juice |
|
The Limits of Theory: Pragmatic Challenges in Mobile Ad Hoc Systems
|
Interno |
Passing Juice |
|
Wireless Ad Hoc Podcasting
|
Interno |
Passing Juice |
|
Link-diversity Routing: A Robust Routing Paradigm for Mobile Networks
|
Interno |
Passing Juice |
|
Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations
|
Interno |
Passing Juice |
|
Routing in Large-Scale Wireless Mesh Networks Using Temperature Fields
|
Interno |
Passing Juice |
|
A System Architecture for Delay-Tolerant Content Distribution
|
Interno |
Passing Juice |
|
Routing Packets into Wireless Mesh Networks
|
Externo |
Passing Juice |
|
Wireless Opportunistic Podcasting: Implementation and Design Tradeoffs
|
Interno |
Passing Juice |
|
Wireless Ad Hoc Podcasting
|
Interno |
Passing Juice |
|
HEAT: Scalable Routing in Wireless Mesh Networks Using Temperature Fields
|
Externo |
Passing Juice |
|
Delay-Tolerant Broadcasting
|
Interno |
Passing Juice |
|
A Macro Mobility Notification Protocol for Hybrid Wireless Mesh Networks
|
Interno |
Passing Juice |
|
Delay-tolerant Broadcasting
|
Interno |
Passing Juice |
|
Measurements from an 802.11b Mobile Ad Hoc Network
|
Interno |
Passing Juice |
|
Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison
|
Interno |
Passing Juice |
|
Analyzing the Impact of Mobility in Ad Hoc Networks
|
Interno |
Passing Juice |
|
Density-based vs. Proximity-based Anycast Routing for Mobile Networks
|
Interno |
Passing Juice |
|
Towards a New Communication Paradigm for Mobile Ad Hoc Networks
|
Interno |
Passing Juice |
|
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
|
Interno |
Passing Juice |
|
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
|
Interno |
Passing Juice |
|
Mini: A Minimal Platform Comparable to Jini for Ubiquitous Computing
|
Interno |
Passing Juice |
|
Hybrid Jini for Limited Devices
|
Interno |
Passing Juice |
|
Field-based Routing and its Application to Wireless Ad Hoc Networks
|
Interno |
Passing Juice |
|
Electrosense: Spectrum Sensing with Increased Frequency Range
|
Interno |
Passing Juice |
|
A Low-cost Sensor Platform for
Large-scale Wideband Spectrum Monitoring
|
Interno |
Passing Juice |
|
OpenSky - A Large-scale ADS-B Sensor Network for Research
|
Interno |
Passing Juice |
|
RFReact: A Real-time Capable and Channel-aware Jamming Platform
|
Interno |
Passing Juice |
|
Mobile WLAN Access Point for the ETH Shuttle Bus
|
Interno |
Passing Juice |